microsoft word.exe

Delimax Concept

This belongs to a Solimba product that may be bundled with additional PUPs or may be part of an ad-supported software program. The application microsoft word.exe by Delimax Concept has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Solimba DownloadMR installer. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars.
Publisher:
Delimax Concept  (signed and verified)

MD5:
eae69499dcf55a2926c4e325355bfd56

SHA-1:
1d90695d02bc537f4ef1ff779f5a6e434fcd845f

SHA-256:
48cd56127bdc1740f8ded33c87c6df438b0d8eae2f85a9f74db0c6d0f9055b1f

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
12/25/2024 4:43:25 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Solimba (M)
16.8.9.21

File size:
566.7 KB (580,304 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Solimba DownloadMR

Common path:
C:\users\{user}\downloads\microsoft word.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
9/23/2014 8:00:00 PM

Valid to:
9/23/2016 7:59:59 PM

Subject:
CN=Delimax Concept, O=Delimax Concept, L=Barcelona, S=Barcelona, C=ES

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
069CC4A932F0EBBF4CDE6CBB8C7AAD67

File PE Metadata
Compilation timestamp:
12/23/2014 4:29:08 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:87KIY9QLsDTE+n/0yrCY2ygd/55+JOUNeKU1dAe/eqtMf/rxAf3bvuO9dk:87K9/DT3/NrCYuLCOCUQe7MnravuOI

Entry address:
0xD44C

Entry point:
E8, AF, 6C, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 00, 60, 42, 00, E8, FE, 15, 00, 00, E8, 80, 6E, 00, 00, 0F, B7, F0, 6A, 02, E8, 42, 6C, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 0B, 65, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.7223  (probably packed)

Code size:
111 KB (113,664 bytes)

The file microsoft word.exe has been seen being distributed by the following URL.

Remove microsoft word.exe - Powered by Reason Core Security